Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2013-04

AUTHORS

Chu-Hsing Lin, Hung-Yan Lin, Tang-Wei Wu, Ying-Hsuan Chen, Chien-Hua Huang

ABSTRACT

Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services. More... »

PAGES

275-282

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x

DOI

http://dx.doi.org/10.1007/s12652-011-0091-x

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1021122170


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Department of Computer Science, Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lin", 
        "givenName": "Chu-Hsing", 
        "id": "sg:person.010744504041.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010744504041.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lin", 
        "givenName": "Hung-Yan", 
        "id": "sg:person.010365243171.81", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010365243171.81"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wu", 
        "givenName": "Tang-Wei", 
        "id": "sg:person.015513407223.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015513407223.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chen", 
        "givenName": "Ying-Hsuan", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Huang", 
        "givenName": "Chien-Hua", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/s1007-0214(09)70097-5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017203557"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/997150.997156", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020238858"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.cose.2009.12.011", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029536700"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.comnet.2010.05.002", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029599983"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.camwa.2009.12.035", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047847291"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2002.1039856", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061393445"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2003.1215651", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061393605"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2005.1453433", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061394080"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mic.2006.5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061403645"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/seccomw.2006.359548", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094544788"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icdcsw.2005.84", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095118694"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icdcsw.2005.84", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095118694"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/pccc.2003.1203698", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095470118"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2013-04", 
    "datePublishedReg": "2013-04-01", 
    "description": "Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s12652-011-0091-x", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1043999", 
        "issn": [
          "1868-5137", 
          "1868-5145"
        ], 
        "name": "Journal of Ambient Intelligence and Humanized Computing", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "2", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "4"
      }
    ], 
    "name": "Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues", 
    "pagination": "275-282", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "64a30594989252016c6bb5344619b0bed4c67e90d6a915294872518700acf5f1"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s12652-011-0091-x"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1021122170"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s12652-011-0091-x", 
      "https://app.dimensions.ai/details/publication/pub.1021122170"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T01:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8697_00000521.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "http://link.springer.com/10.1007%2Fs12652-011-0091-x"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'


 

This table displays all metadata directly associated to this object as RDF triples.

124 TRIPLES      21 PREDICATES      39 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s12652-011-0091-x schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N1423ca64828b47b6b291dec2431e6a04
4 schema:citation https://doi.org/10.1016/j.camwa.2009.12.035
5 https://doi.org/10.1016/j.comnet.2010.05.002
6 https://doi.org/10.1016/j.cose.2009.12.011
7 https://doi.org/10.1016/s1007-0214(09)70097-5
8 https://doi.org/10.1109/icdcsw.2005.84
9 https://doi.org/10.1109/mcom.2002.1039856
10 https://doi.org/10.1109/mcom.2003.1215651
11 https://doi.org/10.1109/mcom.2005.1453433
12 https://doi.org/10.1109/mic.2006.5
13 https://doi.org/10.1109/pccc.2003.1203698
14 https://doi.org/10.1109/seccomw.2006.359548
15 https://doi.org/10.1145/997150.997156
16 schema:datePublished 2013-04
17 schema:datePublishedReg 2013-04-01
18 schema:description Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services.
19 schema:genre research_article
20 schema:inLanguage en
21 schema:isAccessibleForFree false
22 schema:isPartOf Nb485f0d2a93a4941baaec8db630ca794
23 Nbce46be796dc4dee956bfd13a6cd4741
24 sg:journal.1043999
25 schema:name Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues
26 schema:pagination 275-282
27 schema:productId N0a1c7b21a4964b28b9774c248a3de050
28 Na55e5a606b974654941c98f4cc0ce7dd
29 Naad37a20246549e6a200ef0da5e4df14
30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021122170
31 https://doi.org/10.1007/s12652-011-0091-x
32 schema:sdDatePublished 2019-04-11T01:09
33 schema:sdLicense https://scigraph.springernature.com/explorer/license/
34 schema:sdPublisher N6e2747e2d8494bdc99ce9f0288e95230
35 schema:url http://link.springer.com/10.1007%2Fs12652-011-0091-x
36 sgo:license sg:explorer/license/
37 sgo:sdDataset articles
38 rdf:type schema:ScholarlyArticle
39 N0a1c7b21a4964b28b9774c248a3de050 schema:name doi
40 schema:value 10.1007/s12652-011-0091-x
41 rdf:type schema:PropertyValue
42 N120979f11de54ff7a5b34fcbb5e43b10 rdf:first sg:person.015513407223.53
43 rdf:rest N365c53391d2c4cc7b6d9f04af9aa3ca6
44 N1423ca64828b47b6b291dec2431e6a04 rdf:first sg:person.010744504041.35
45 rdf:rest Nc582633bf21d44838b79bfd9b70c1bfe
46 N365c53391d2c4cc7b6d9f04af9aa3ca6 rdf:first N8b2be9088998404d8b10de69d31ae744
47 rdf:rest Nbd911439fd0643fcae490d3e68ba702e
48 N6e2747e2d8494bdc99ce9f0288e95230 schema:name Springer Nature - SN SciGraph project
49 rdf:type schema:Organization
50 N8b2be9088998404d8b10de69d31ae744 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
51 schema:familyName Chen
52 schema:givenName Ying-Hsuan
53 rdf:type schema:Person
54 Na55e5a606b974654941c98f4cc0ce7dd schema:name dimensions_id
55 schema:value pub.1021122170
56 rdf:type schema:PropertyValue
57 Naad37a20246549e6a200ef0da5e4df14 schema:name readcube_id
58 schema:value 64a30594989252016c6bb5344619b0bed4c67e90d6a915294872518700acf5f1
59 rdf:type schema:PropertyValue
60 Nb485f0d2a93a4941baaec8db630ca794 schema:volumeNumber 4
61 rdf:type schema:PublicationVolume
62 Nb776ae272bbb456eadd518b12e39385d schema:affiliation https://www.grid.ac/institutes/grid.265231.1
63 schema:familyName Huang
64 schema:givenName Chien-Hua
65 rdf:type schema:Person
66 Nbce46be796dc4dee956bfd13a6cd4741 schema:issueNumber 2
67 rdf:type schema:PublicationIssue
68 Nbd911439fd0643fcae490d3e68ba702e rdf:first Nb776ae272bbb456eadd518b12e39385d
69 rdf:rest rdf:nil
70 Nc582633bf21d44838b79bfd9b70c1bfe rdf:first sg:person.010365243171.81
71 rdf:rest N120979f11de54ff7a5b34fcbb5e43b10
72 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
73 schema:name Technology
74 rdf:type schema:DefinedTerm
75 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
76 schema:name Communications Technologies
77 rdf:type schema:DefinedTerm
78 sg:journal.1043999 schema:issn 1868-5137
79 1868-5145
80 schema:name Journal of Ambient Intelligence and Humanized Computing
81 rdf:type schema:Periodical
82 sg:person.010365243171.81 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
83 schema:familyName Lin
84 schema:givenName Hung-Yan
85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010365243171.81
86 rdf:type schema:Person
87 sg:person.010744504041.35 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
88 schema:familyName Lin
89 schema:givenName Chu-Hsing
90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010744504041.35
91 rdf:type schema:Person
92 sg:person.015513407223.53 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
93 schema:familyName Wu
94 schema:givenName Tang-Wei
95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015513407223.53
96 rdf:type schema:Person
97 https://doi.org/10.1016/j.camwa.2009.12.035 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047847291
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1016/j.comnet.2010.05.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029599983
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1016/j.cose.2009.12.011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029536700
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1016/s1007-0214(09)70097-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017203557
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1109/icdcsw.2005.84 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095118694
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1109/mcom.2002.1039856 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061393445
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1109/mcom.2003.1215651 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061393605
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1109/mcom.2005.1453433 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061394080
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1109/mic.2006.5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061403645
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1109/pccc.2003.1203698 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095470118
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1109/seccomw.2006.359548 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094544788
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1145/997150.997156 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020238858
120 rdf:type schema:CreativeWork
121 https://www.grid.ac/institutes/grid.265231.1 schema:alternateName Tunghai University
122 schema:name Department of Computer Science, Tunghai University, 407, Taichung, Taiwan, ROC
123 Tunghai University, 407, Taichung, Taiwan, ROC
124 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...